A method for group key distribution with forward security

A forward security and group key technology, applied in key distribution, can solve the problems of large storage overhead and inapplicability, achieve the effect of less calculation and storage, good practical application value, and solve forward security problems

Active Publication Date: 2021-09-24
HUBEI UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method requires each user to maintain n(n-1) / 2 "user pair keys" (assuming there are n users in the group), which will bring relatively large storage overhead, and is not suitable for grouping through mobile devices. Users who communicate within the group; and the "user-to-key" between users is fixed, which will bring some security problems. The "user pair key", then the adversary can obtain the communication information of the intra-group communication they participated in before through the "user pair key"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for group key distribution with forward security
  • A method for group key distribution with forward security
  • A method for group key distribution with forward security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0021] A group key distribution method with forward security provided by the present invention assumes that there are n users in the group {U 1 ,U 2 ,...,U n}, user U k (k=1,2,…,n) randomly created a t-degree symmetric bivariate polynomial: f k (x,y)=(a k00 +a k10 x+a k01 y+a k11 xy+a k20 x 2 +a k02 the y 2 +a k21 x 2 y+a k12 xy 2 +a k22 x 2 the y 2 +…+a ktt x t the y t )mod q, where q is a large prime number, a kij =a kji ; In addition, there are n+1 constants that are public information {x 1 ,x 2 ,...,x n ,x'}; k=1,2,...,n; a k00 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a group key distribution method with forward security. In order to realize secure communication between users in the group, it is necessary to use the group key to encrypt and decrypt the communication content. Therefore, before the secure communication within the group starts, the group key used for this communication needs to be safely distributed to the users in the group who need to communicate. The key problem solved by the invention is how to carry out group key distribution with forward security without a trusted third party. The present invention utilizes the symmetric binary polynomial to negotiate a symmetric key between each pair of users in the group, and uses the symmetric key to realize the safe distribution of the group key. At the same time, the present invention maintains a communication record table for each user, and updates the symmetric key between users for securely distributing the group key of the next round of intra-group communication according to the record table, thereby achieving forward security group key distribution.

Description

technical field [0001] The invention belongs to the technical field of information security, relates to a method for distributing a group key, in particular to a method for distributing a group key with forward security. Background technique [0002] Intra-group secure communication has a wide range of applications. For example, in an enterprise, the chairman convenes the leaders of various departments to conduct secure voice conferences or video conferences through open channels, or the technical department conducts secure technical solution discussions through open channels, etc., all of which require secure intra-group communication. How to achieve safe intra-group communication? A common practice is to safely distribute a group key to users in the group who need to communicate, and use this group key to encrypt and decrypt the communication information of these users. There are usually two types of methods for safely distributing group keys: one is that there is a "use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0822H04L63/065
Inventor 沈华张明武石润华刘雅静孙代杰陈誉张依梦陈效
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products